Thinking operationally [IT security] (Englisch)
- Neue Suche nach: Potter, Bruce
- Neue Suche nach: Potter, Bruce
In:
IEEE security & privacy
;
8
, 3
;
54-55
;
2019
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Thinking operationally [IT security]
-
Beteiligte:Potter, Bruce ( Autor:in )
-
Erschienen in:IEEE security & privacy ; 8, 3 ; 54-55
-
Verlag:
- Neue Suche nach: IEEE COMPUTER SOCIETY
-
Erscheinungsdatum:01.01.2019
-
Format / Umfang:2 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 005.8 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 8, Ausgabe 3
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Table of contents| 2010
- 3
-
From the Editors - Balancing Liberty, Stability, and SecurityMichael, Bret et al. | 2010
- 3
-
Balancing Liberty, Stability, and SecurityMichaels, Bret et al. | 2010
- 4
-
IEEE Security & Privacy [masthead]| 2010
- 5
-
Silver Bullet Talks with Steven KentMcGraw, Gary et al. | 2010
- 5
-
Interview - Silver Bullet Talks with Steven KentMcGraw, Gary et al. | 2010
- 10
-
Digital Editions [advertisement]| 2010
- 11
-
News BriefsPaulson, Linda Dailey et al. | 2010
- 11
-
News - News BriefsDailey Paulson, Linda et al. | 2010
- 14
-
Protection Poker: The New Software Security "Game";Williams, Laurie / Meneely, Andrew / Shipley, Grant et al. | 2010
- 14
-
Assessing Risk - Protection Poker: The New Software Security "Game"Williams, Laurie et al. | 2010
- 21
-
Toward Risk Assessment of Large-Impact and Rare EventsHole, Kjell J / Netland, Lars-Helge et al. | 2010
- 28
-
Data Collection - Security Decision Support: Challenges in Data Collection and UseCook, Ian P et al. | 2010
- 28
-
Security Decision Support Challenges in Data Collection and UseCook, Ian / Pfleeger, Shari et al. | 2010
- 36
-
Mobile Computing - Securing Android-Powered Mobile Devices Using SELinuxShabtai, Asaf et al. | 2010
- 36
-
Securing Android-Powered Mobile Devices Using SELinuxShabtai, Asaf / Fledel, Yuval / Elovici, Yuval et al. | 2010
- 45
-
Security Costs - The Economics of Click FraudKshetri, Nir et al. | 2010
- 45
-
The Economics of Click FraudKshetri, Nir et al. | 2010
- 54
-
Thinking operationally [IT security]Potter, Bruce et al. | 2010
- 54
-
It All Depends - Thinking OperationallyPotter, Bruce et al. | 2010
- 54
-
Thinking OperationallyKaufman, L. M. / Potter, B. et al. | 2010
- 56
-
Demythifying CybersecurityTalbot, Edward B / Frincke, Deborah / Bishop, Matt et al. | 2010
- 56
-
Education - Demythifying CybersecurityTalbot, Edward B et al. | 2010
- 60
-
The Virtualization SolutionCohen, Fred et al. | 2010
- 60
-
On the Horizon - The Virtualization SolutionCohen, Fred et al. | 2010
- 64
-
Privacy Interests - Risk-Based De-Identification of Health DataEl Emam, Khaled et al. | 2010
- 64
-
Risk-Based De-Identification of Health DataEl Emam, Khaled et al. | 2010
- 67
-
IEEE Reliability Society Information| 2010
- 68
-
XTS: A Mode of AES for Encrypting Hard DisksMartin, Luther et al. | 2010
- 68
-
Crypto Corner - XTS: A Mode of AES for Encrypting Hard DisksMartin, Luther et al. | 2010
- 70
-
Attack Trends - Cyber-Threat Proliferation: Today's Truly Pervasive Global EpidemicKellermann, Tom et al. | 2010
- 70
-
Cyber-Threat Proliferation: Today's Truly Pervasive Global EpidemicKellerman, Tom et al. | 2010
- 73
-
IEEE Computer Society Information| 2010
- 74
-
Secure Systems - The Next Malware Battleground: Recovery After Unknown InfectionGiffin, Jon et al. | 2010
- 74
-
The Next Malware Battleground: Recovery After Unknown InfectionGiffin, Jon et al. | 2010
- 77
-
Son of Carterfone: Network Neutrality or Regulation?Lesk, Michael et al. | 2010
- 77
-
Security & Privacy Economics - Son of Carterfone: Network Neutrality or Regulation?Lesk, Michael et al. | 2010
- 82
-
Advertiser Index| 2010
- 83
-
Threat Modeling - Perhaps It's TimeSteven, John et al. | 2010
- 83
-
Building Security In - Threat Modeling — Perhaps It's TimeSteven, John et al. | 2010
- 88
-
ClearText - FratricideGeer Jr, Daniel E et al. | 2010
- 88, 87
-
Fratricide [on cybersecurity issues]Geer, Daniel E et al. | 2010
- 88
-
FratricideGeer, D. E. et al. | 2010
- c1
-
[Front cover]| 2010
- c2
-
IEEE Security & Privacy call for papers| 2010
- c3
-
Jobs Board [advertisement]| 2010
- c4
-
19th Usenix Security Symposium Advertisement| 2010
-
Calls for Papers - C2| 2010